Skip to main content
Log in

A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Physical Layer Security (PLS) has emerged as a promising solution for small and resource-limited wireless communications devices, to reduce the overhead associated with the required security resources and latency. In contrast to traditional security schemes, PLS relies on and benefits from the random nature of physical channels. However, the majority of PLS schemes in the literature lack the notion of secrecy and dynamicity, and employ static keys to generate fixed cipher primitives. In this paper, a dynamic key generation scheme that combines a pre-shared/stored secret key with a dynamic nonce extracted from channel information (for each new session) is proposed. The main advantage of this approach is that it achieves a high-security level with minimal overhead. Moreover, the obtained dynamic key can be changed frequently upon any change in channel parameters. Using the produced dynamic keys, cipher primitives are generated (permutation operations), which get updated for each frame symbol. This process ensures different and unique encryption layers for each new input frame and for each symbol in the input frame. Equally important, the proposed encryption algorithm operates at the modulation symbol level in order to attain performance by limiting the effect of error propagation and by realizing parallel encryption/decryption for each frame symbol. In addition, a preamble encryption scheme is also proposed to prevent unauthorized synchronization or channel estimation by illegitimate users. The security level of the proposed cipher scheme mainly depends on a secret key and the dynamicity of the channel to update the cipher primitives used for each frame symbol. Finally, security and performance analyses validate the efficiency and the robustness of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Zhang X et al (2018) Compressive sensing based multiuser detection via iterative reweighed approach in M2M communications. IEEE Wireless Commun Lett

  2. Chen B et al (2017) A dynamic module deployment framework for M2M platforms. In: IEEE Proc Int Symp Cloud and Service Computing (SC2). IEEE, pp 194–200

  3. Akitaya T, Saba T (2015) Energy efficient artificial fast fading for MISO-OFDM systems. In: Proc IEEE Global Commun Conf (GLOBECOM), San Diego, CA, USA, pp 1–6

  4. Zhang J et al (2017) Design of an OFDM physical layer encryption scheme. IEEE Trans Veh Technol 66 (3):2114–2127

    Article  Google Scholar 

  5. Lampinen K, Westman T, Haikola V Method and apparatus for physical layer link adaptation based on traffic properties, Mar. 14 2017, uS Patent 9,596,057

  6. Hussein S, Noura H, Martin S, Boukhatem L, Agha KA (2013) ERCA: Efficient and robust cipher algorithm for LTE data confidentiality. In: Proceedings of the 16th ACM international conference on modeling, analysis & simulation of wireless and mobile systems. ACM, pp 299–308

  7. Noura H, Hussein S, Martin S, Boukhatem L, Agha KA (2015) ERDIA: An efficient and robust data integrity algorithm for mobile and wireless networks. In: IEEE Proc. Wireless Commun Net. Conf. (WCNC). IEEE, pp 2103–2108

  8. Huo F, Gong G (2014) A new efficient physical layer OFDM encryption scheme. In: Proc IEEE Int Conf Computer Commun (INFOCOM), Toronto, ON, Canada, pp 1024–1032

  9. Akitaya T, Asano S, Saba T (2014) Time-domain artificial noise generation technique using time-domain and frequency-domain processing for physical layer security in MIMO-OFDM systems. In: Proc IEEE Int Conf Commun (ICC), Sydney, NSW, Australia, pp 807–812

  10. Wu X et al (2016) Artificial-noise-aided physical layer phase challenge-response authentication for practical OFDM transmission. IEEE Trans Wirel Commun 15(10):6611–6625

    Article  Google Scholar 

  11. Cao Y, Jiang T, Han Z (2016) A survey of emerging M2M systems: Context, task, and objective. IEEE Internet of Things Journal 3(6):1246–1258

    Article  Google Scholar 

  12. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805

    Article  MATH  Google Scholar 

  13. Asadi A, Wang Q, Mancuso V (2014) A survey on device-to-device communication in cellular networks. IEEE Commun Surv Tutorials 16(4):1801–1819. Fourthquarter

    Article  Google Scholar 

  14. Chen S, et al. (2017) Vehicle-to-everything (v2x) services supported by LTE-based systems and 5G. IEEE Commun Standards Mag 1(2):70–76

    Article  Google Scholar 

  15. Adame T, Bel A, Bellalta B, Barcelo J, Oliver M (2014) IEEE 802.11 Ah: the WiFi approach for M2M communications. IEEE Wireless Commun 21(6):144–152

    Article  Google Scholar 

  16. Huo F, Gong G (2014) A new efficient physical layer OFDM encryption scheme. In: Proc IEEE Int Conf Computer Commun (INFOCOM), Toronto, ON, Canada, pp 1024–1032

  17. Noura H, Melki R, Chehab A, Mansour M, Martin S (2018) Efficient and secure physical encryption scheme for Low-Power wireless M2M devices. In: IWCMC 2018 Security Symposium (IWCMC-security 2018), Limassol, Cyprus

  18. Tsai Y-R, Tai C-W, Yang K-J (2014) Effective channel perturbation based on cyclic delay for physical layer security in OFDM systems. In: Proc Int Conf Inf science, Electronics Electrical Eng’g (ISEEE), vol 2, pp 823–827

  19. Hamamreh J, Arslan H (2017) Secure orthogonal transform division multiplexing (OTDM) waveform for 5G and beyond. IEEE Commun Lett 21(5):1191–1194

    Article  Google Scholar 

  20. Zhang J, Duong TQ, Marshall A, Woods R (2016) Key generation from wireless channels: a review. IEEE Access 4:614–626

    Article  Google Scholar 

  21. Zhang J, Marshall A, Woods R, Duong TQ (2016) Efficient key generation by exploiting randomness from channel responses of individual ofdm subcarriers. IEEE Trans Commun 64(6):2578–2588

    Article  Google Scholar 

  22. Zhang J, He B, Duong TQ, Woods R (2017) On the key generation from correlated wireless channels. IEEE Commun Lett 21(4):961–964

    Article  Google Scholar 

  23. Rahbari H, Krunz M (2017) Exploiting frame preamble waveforms to support new physical-layer functions in OFDM-based 802.11 systems. IEEE Trans Wirel Commun 16(6):3775–3786

    Article  Google Scholar 

  24. Zhang J, Marshall A, Woods R, Duong TQ (2017) Design of an ofdm physical layer encryption scheme. IEEE Trans Veh Technol 66(3):2114–2127

    Article  Google Scholar 

  25. Badawy A et al (2016) Unleashing the secure potential of the wireless physical layer: Secret key generation methods. Phys Commun 19:1–10

    Article  Google Scholar 

  26. Noura H, Chehab A, Sleem L, Noura M, Couturier R, Mansour M (2018) One round cipher algorithm for multimedia IoT devices. Multimed Tools Appl 77(14):18383–18413

    Article  Google Scholar 

  27. Bassham L et al (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST NIST Pubs 800-22 Rev 1a

  28. Lee Rodgers J, Nicewander WA (1988) Thirteen ways to look at the correlation coefficient. Amer Statist 42(1):59–66

    Article  Google Scholar 

  29. Massoudi A et al (2008) Overview on selective encryption of image and video: challenges and perspectives. EURASIP J Inf Secur 2008(1):1–18

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hassan N. Noura.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Noura, H.N., Melki, R., Chehab, A. et al. A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach. Mobile Netw Appl 24, 447–463 (2019). https://doi.org/10.1007/s11036-018-1151-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-018-1151-7

Keywords

Navigation